George Loukas
Orcid: 0000-0003-3559-5182Affiliations:
- University of Greenwich, UK
According to our database1,
George Loukas
authored at least 75 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2025
Doing cybersecurity at home: A human-centred approach for mitigating attacks in AI-enabled home devices.
Comput. Secur., 2025
2024
Int. J. Hum. Comput. Stud., 2024
A qualitative field study on explainable AI for lay users subjected to AI cyberattacks.
CoRR, 2024
Proceedings of the 21st IEEE International Conference on Software Architecture, 2024
2023
Pers. Ubiquitous Comput., December, 2023
Forensic Sci. Int. Digit. Investig., March, 2023
Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments.
Comput. Secur., 2023
Proceedings of the Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
IT Prof., 2022
Inf., 2022
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles.
IEEE Access, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021
Transformer-based identification of stochastic information cascades in social networks using text and image similarity.
Appl. Soft Comput., 2021
2020
Dynamic decision support for resource offloading in heterogeneous Internet of Things environments.
Simul. Model. Pract. Theory, 2020
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
A Prototype Deep Learning Paraphrase Identification Service for Discovering Information Cascades in Social Networks.
Proceedings of the 2020 IEEE International Conference on Multimedia & Expo Workshops, 2020
Proceedings of the From Lambda Calculus to Cybersecurity Through Program Analysis, 2020
2019
A Secure Occupational Therapy Framework for Monitoring Cancer Patients' Quality of Life.
Sensors, 2019
Ad Hoc Networks, 2019
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019
Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment.
Proceedings of the MobiQuitous 2019, 2019
Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective.
Proceedings of the 2019 on International Conference on Multimedia Retrieval, 2019
A Prototype Framework for Assessing Information Provenance in Decentralised Social Media: The EUNOMIA Concept.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019
2018
Comput. Secur., 2018
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework.
Comput. Secur., 2018
IEEE Access, 2018
IEEE Access, 2018
On the successful deployment of community policing services the TRILLION project case.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
2017
Computation offloading of a vehicle's continuous intrusion detection workload for energy efficiency and performance.
Simul. Model. Pract. Theory, 2017
Location-Enhanced Activity Recognition in Indoor Environments Using Off the Shelf Smart Watch Technology and BLE Beacons.
Sensors, 2017
Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
Detecting Cyber-Physical Threats in an Autonomous Robotic Vehicle Using Bayesian Networks.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017
2016
Predicting the performance of users as human sensors of security threats in social media.
Int. J. Cyber Situational Aware., 2016
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history.
Digit. Investig., 2016
A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks.
ACM Comput. Surv., 2016
You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks.
IEEE Access, 2016
Proceedings of the Computer and Information Sciences - 31st International Symposium, 2016
Evaluating the reliability of users as human sensors of social media security threats.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016
Proceedings of the 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, 2016
Proceedings of the 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, 2016
Proceedings of the 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, 2016
2015
Decision tree-based detection of denial of service and command injection attacks on robotic vehicles.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Int. J. Adv. Intell. Paradigms, 2014
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
2013
A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing.
Simul. Model. Pract. Theory, 2013
Future Internet, 2013
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
2012
Proceedings of the Computer and Information Sciences III, 2012
2010
2009
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
2008
Proceedings of the Visions of Computer Science, 2008
Proceedings of the 1st International ICST Conference on Ambient Media and Systems, 2008
2007
A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network.
Comput. J., 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network.
Proceedings of the FUZZ-IEEE 2007, 2007
2006
2005
Proceedings of the 2005 International Conference on a World of Wireless, 2005